Description
In the Linux kernel, the following vulnerability has been resolved:

xfs: check return value of xchk_scrub_create_subord

Fix this function to return NULL instead of a mangled ENOMEM, then fix
the callers to actually check for a null pointer and return ENOMEM.
Most of the corrections here are for code merged between 6.2 and 6.10.
Published: 2026-03-18
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Linux kernel’s XFS subsystem causes a failure to properly handle a null return value from the xchk_scrub_create_subord function. The function was returning a malformed ENOMEM value instead of NULL, and callers were not verifying the pointer. This oversight can lead to improper memory accesses that may trigger a kernel panic, effectively denying service to the affected system.

Affected Systems

The vulnerability affects any system running a Linux kernel version that incorporates the code merged between releases 6.2 and 6.10. All distributions that ship these kernels without the specified patch are potentially impacted.

Risk and Exploitability

The CVSS base score for this issue is 7.0, indicating a high severity. However, the EPSS score is reported as less than 1 percent and the vulnerability is not listed in the CISA KEV catalog, suggesting a low current exploitation likelihood. The attack vector is likely local, requiring an attacker to trigger XFS scrub operations or otherwise invoke the affected internal function. Exploitation would result in a kernel crash rather than privilege elevation or data compromise.

Generated by OpenCVE AI on March 26, 2026 at 03:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the fix for CVE-2026-23250, such as installing the latest stable release or backporting the patch from the kernel repository.

Generated by OpenCVE AI on March 26, 2026 at 03:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-703

Wed, 25 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-703

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-690

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-690

Thu, 19 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Wed, 18 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: xfs: check return value of xchk_scrub_create_subord Fix this function to return NULL instead of a mangled ENOMEM, then fix the callers to actually check for a null pointer and return ENOMEM. Most of the corrections here are for code merged between 6.2 and 6.10.
Title xfs: check return value of xchk_scrub_create_subord
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:03:08.533Z

Reserved: 2026-01-13T15:37:45.990Z

Link: CVE-2026-23250

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-18T18:16:22.950

Modified: 2026-03-19T13:25:00.570

Link: CVE-2026-23250

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2026-23250 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:21:05Z

Weaknesses

No weakness.